Patents by Inventor Sang-gyoo Sim

Sang-gyoo Sim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11936773
    Abstract: An encryption key management method includes: receiving a data registration request from a supplier terminal, determining a data identifier associated with the content data, encrypting a master key with a public key of the supplier terminal, and providing the supplier terminal with the master key encrypted with the public key of the supplier terminal, the data identifier, and a key update count value; receiving a subscription application related to the data identifier from a first subscriber terminal, encrypting the master key with a public key of the first subscriber terminal, and providing the first subscriber terminal with the master key encrypted with the public key of the first subscriber terminal and the key update count value; receiving encrypted content data encrypted with the symmetric key and a hash for the content data from the supplier terminal; and transmitting the encrypted content data and the hash to the first subscriber terminal.
    Type: Grant
    Filed: November 18, 2021
    Date of Patent: March 19, 2024
    Assignee: Penta Security Inc.
    Inventors: Jin Hyeok Oh, Sang Jun Lee, Myong Cheol Lim, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
  • Publication number: 20240078320
    Abstract: Disclosed is a method and apparatus for detecting anomalies in a system log on the basis of self-supervised learning, using a language model. The method comprises performing preprocessing on the system log, generating a normal token sequence having a preset length by concatenating tokenized log lines of the system log, generating an abnormal token sequence using the normal token sequence, calculating an anomaly score for a determination target token sequence using a sentence classification model, and determining the token sequence as an abnormal system log when the calculated anomaly score is greater than a threshold value.
    Type: Application
    Filed: August 2, 2023
    Publication date: March 7, 2024
    Inventors: Duk Soo KIM, Eui Seok KIM, Sang Gyoo SIM, Ki Ho JOO, Jung Won LEE, Jong Guk LEE, Jung Wook KIM, Sang Seok LEE, Seung Young PARK
  • Patent number: 11922059
    Abstract: A method of distributedly storing data in a system comprising a plurality of edge nodes communicatively coupled to an end device and a central cloud. The method includes: receiving, by a first edge node, data transmitted by the end device; assigning, by the first edge node, a data tag to received data according to attributes of the received data and duplicating the received data to generate a tagged data copy; and transmitting, by the first edge node, the tagged data copy to at least one second edge node determined by a data distribution policy determined by the central cloud directly or through the central cloud, so that the at least one second edge node store the tagged data copy in a storage.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: March 5, 2024
    Assignee: Penta Security Systems Inc.
    Inventors: Myung Woo Chung, Chel Park, Sang Gyoo Sim, Eui Seok Kim, Duk Soo Kim, Seok Woo Lee
  • Patent number: 11914564
    Abstract: A Merkle tree-based data management method may comprise: aligning data into two-dimensional square matrix; calculating a hash value of each node of the two-dimensional square matrix; calculating hash values of each row of the two-dimensional square matrix; generating an additional column with nodes having the hash values of each row; calculating hash values of each column of the two-dimensional square matrix; generating an additional row with nodes having hash values of each column; and calculating a Merkle root by concatenating the hash values of the additional column and the hash values of the additional row.
    Type: Grant
    Filed: November 29, 2022
    Date of Patent: February 27, 2024
    Assignee: Penta Security Inc.
    Inventors: Jin Hyeok Oh, Keon Yun, Sun Woo Yun, Sang Min Lee, Jun Yong Lee, Sang Gyoo Sim, Tae Gyun Kim
  • Patent number: 11869354
    Abstract: A method of detecting an anomaly of a road side unit, which is performed by an anomaly detecting apparatus interworking with one or more road side units, may comprise: receiving traffic data from each of the one or more road side units; performing grouping on the one or more road side units based on the traffic data; generating input data of an artificial neural network based on a result of the performing of the grouping; generating output data of the artificial neural network based on the input data; and detecting an anomaly of each of the one or more road side units based on the output data.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: January 9, 2024
    Assignees: Autocrypt Co., Ltd., Penta Security Systems Inc.
    Inventors: Seung Young Park, Duk Soo Kim, Seok Woo Lee, Eui Seok Kim, Sang Gyoo Sim
  • Publication number: 20230177041
    Abstract: A data-sharing method, performed by a processor in a data-sharing apparatus including a blockchain ad a data subscription platform server, may comprise: registering, by the data subscription platform server, a data supply plan in the blockchain according to a request of a data supplier; registering, by the data subscription platform server, content data supplied from the data supplier; managing, by the data subscription platform server, data subscription rights of a data subscriber by using the blockchain according to a subscription request of the data subscriber; and supplying, by the data subscription platform server, the content data to the data subscriber.
    Type: Application
    Filed: May 16, 2022
    Publication date: June 8, 2023
    Inventors: Jin Hyeok OH, Myong Cheol LIM, Sang Gyoo SIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20230169850
    Abstract: A method for identifying autonomous driving vehicles, performed by an autonomous driving vehicle identification apparatus installed in a roadside unit (RSU), may comprise: receiving, from a vehicle entering a vehicle-to-infrastructure (V2I) communication area of the RSU, a probe vehicle data (PVD) message; determining whether a data element indicating an autonomous driving level is present in the PVD message; and in response to determining that the data element does not exist in the PVD message, identifying the vehicle transmitting the PVD message as a normal vehicle.
    Type: Application
    Filed: May 18, 2022
    Publication date: June 1, 2023
    Inventors: Won Haeng LEE, Sang Gyoo SIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20230142949
    Abstract: An encryption key management method includes: receiving a data registration request from a supplier terminal, determining a data identifier associated with the content data, encrypting a master key with a public key of the supplier terminal, and providing the supplier terminal with the master key encrypted with the public key of the supplier terminal, the data identifier, and a key update count value; receiving a subscription application related to the data identifier from a first subscriber terminal, encrypting the master key with a public key of the first subscriber terminal, and providing the first subscriber terminal with the master key encrypted with the public key of the first subscriber terminal and the key update count value; receiving encrypted content data encrypted with the symmetric key and a hash for the content data from the supplier terminal; and transmitting the encrypted content data and the hash to the first subscriber terminal.
    Type: Application
    Filed: November 18, 2021
    Publication date: May 11, 2023
    Inventors: Jin Hyeok OH, Sang Jun LEE, Myong Cheol LIM, Sang Gyoo SIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20230143929
    Abstract: Provided are a driving negotiation method and apparatus for supporting stability against a blind spot, an unexpected situation, etc. and a rapid judgment and response of an autonomous vehicle in various driving environments. The driving negotiation apparatus includes a wireless communication module configured to support vehicle to everything (V2X) communication and at least one processor connected to the wireless communication module. The at least one processor receives a cooperative request message from a first vehicle, broadcasts a cooperative request message and additional information required for a negotiation to surrounding vehicles, receives a cooperative response message from at least one second vehicle among the surrounding vehicles, and transmits a message indicating that the negotiation is possible or impossible to the first vehicle on the basis of the cooperative response message.
    Type: Application
    Filed: November 29, 2021
    Publication date: May 11, 2023
    Inventors: Keon YUN, Myung Woo CHUNG, Sang Gyoo SIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20230132505
    Abstract: A blockchain-based certification audit data sharing and integrity verification system includes at least one user equipment configured to participate in a blockchain-based platform and mounted with a user authentication application; at least one certification agency server configured to participate in the blockchain-based platform and to provide authentication data composed of user data for authenticity verification, certificate or completion certificate data, and certification audit data; at least one blockchain-based platform server configured to record an authentication transaction in a block; and a blockchain-based certification audit data sharing and integrity verification device configured to: generate audit result data by auditing forgery verification of a document requested by the user authentication application of the user equipment using the authentication data of the at least one certification agency server in interlock with the blockchain-based platform server, and share the generated audit result
    Type: Application
    Filed: November 12, 2021
    Publication date: May 4, 2023
    Inventors: Won Haeng LEE, Kwon Koo KWAK, Il Koo JUNG, Sang Gyoo SIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20220407874
    Abstract: An intrusion detection method for a CAN, performed by a processor, may comprise: collecting CAN IDs from the CAN in an order of occurrence; generating a sequence of a predetermined number L of CAN IDs from the collected CAN IDs, L being an integer greater than or equal to 1; and inputting the sequence into a bi-directional GPT2 network and calculating a value of a loss function corresponding to the sequence, wherein when a number of allowed CAN IDs is K, the allowed CAN IDs in the sequence are sorted in an order of magnitude and converted into values 0 to K?1, CAN IDs that are not allowed in the sequence are converted to K, the sequence is input to the bidirectional GPT2 network, and K is an integer equal to or greater than 1.
    Type: Application
    Filed: June 14, 2022
    Publication date: December 22, 2022
    Inventors: Ki Ho JOO, Seung Young PARK, Sang Gyoo SIM, Eui Seok KIM, Duk Soo KIM, Seok Woo LEE, Jung Won LEE
  • Patent number: 11529960
    Abstract: Provided is a method for detecting a driver's abnormalities based on a CAN (Controller Area Network) bus network communicating with an ECU (Electronic Control Unit) of a vehicle. The method may include: acquiring a CAN bus signal related to an operation of the vehicle from the CAN bus network; extracting a detection vector from the CAN bus signal using an auto encoder; and detecting a driver's abnormality based on the detection vector.
    Type: Grant
    Filed: November 20, 2019
    Date of Patent: December 20, 2022
    Assignees: PENTA SECURITY SYSTEMS INC., AUTOCRYPT CO., LTD.
    Inventors: Seok Woo Lee, Duk Soo Kim, Eui Seok Kim, Sang Gyoo Sim, Seung Young Park
  • Publication number: 20220368540
    Abstract: A device for secure and automated enrollment-certificate bootstrapping on keys and certificates for a vehicle to everything (V2X) environment of a V2X end entity in a security credential management system (SCMS) for V2X communication, the device comprising: a processor; and a memory configured to store at least one instruction to be performed by the processor, the at least one instruction is configured to instruct the processor to perform steps of: by a secure bootstrapping service (SBS) agent, checking, for an SSB server, configuration information; by the SBS agent, making a request for bootstrapping data to the SBS server; and by the SBS agent, installing the bootstrapping data in the SBS server.
    Type: Application
    Filed: November 5, 2021
    Publication date: November 17, 2022
    Inventors: Seok Woo LEE, Duk Soo KIM, Eui Seok KIM, Sang Gyoo SIM, Jung Ook KIM, Jong Guk LEE, Young Seok OH, Sang Seok LEE
  • Patent number: 11456878
    Abstract: A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.
    Type: Grant
    Filed: January 22, 2021
    Date of Patent: September 27, 2022
    Assignees: PENTA SECURITY SYSTEMS INC., AUTOCRYPT CO., LTD.
    Inventors: Myung Woo Chung, Hyun Min Choi, Sang Gyoo Sim, Eui Seok Kim, Duk Soo Kim, Seok Woo Lee
  • Patent number: 11438248
    Abstract: An operation method of a communication node in a communication network may comprise receiving CAN signals from a plurality of CAN communication nodes; generating forward input data by performing forward preprocessing on the received CAN signals based on forward sampling times; generating forward mask data for the forward input data and forward time interval data according to the forward sampling times; generating backward input data by performing backward preprocessing on the CAN signals based on backward sampling times; generating backward mask data for the backward input data and backward time interval data according to the backward sampling times; and detecting an abnormal signal among the CAN signals by inputting the forward input data, forward mask data, forward time interval data, backward input data, backward mask data, and backward time interval data into a gated recurrent unit-decay (GRU-D) neural network.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: September 6, 2022
    Assignees: Penta Security Systems Inc., Autocrypt Co., Ltd.
    Inventors: Seung Young Park, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee, Myung Jin Kim, Eui Seok Kim
  • Patent number: 11381489
    Abstract: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: July 5, 2022
    Assignee: Penta Security Systems Inc.
    Inventors: Jin Hyeok Oh, Myung Woo Chung, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
  • Publication number: 20220201054
    Abstract: The present disclosure provides an apparatus and method of controlling a resource sharing in a real-time data transmission network which can increase a network efficiency by decentralizing data operation loads and reducing duplicate operations. The resource sharing control device is one of a plurality of devices included in a real-time data transmission system which delivers transmit data provided by a data producer to a data consumer. At least one instruction when executed by the processor causes the processor to: establish a delivery path passing at least some of the plurality of resource sharing control devices in the real-time data transmission system and through which the transmit data is delivered; and decompose an operation to be performed on the transmit data into a plurality of partial operations and allocate each of the partial operations to one or more of the plurality of resource sharing control devices on the delivery path.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 23, 2022
    Inventors: Gyu Ho LEE, Hyun Jae PARK, Min Woo NAM, Sang Gyoo SIM, Hyun Ho SHIN, Duk Soo KIM, Seok Woo LEE
  • Patent number: 11336668
    Abstract: Disclosed is a method of detecting whether a groupware user's behavior is an abnormal behavior. The method includes acquiring a uniform resource identifier (URI) from the user's behavior, generating a URI sequence from the URI on the basis of a predetermined time interval, preprocessing the URI sequence to generate a primitive URI sequence, calculating a log probability value from the primitive URI sequence, and detecting whether the user's behavior is an abnormal behavior on the basis of the log probability value and a predetermined threshold value.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: May 17, 2022
    Assignee: PENTA SECURITY SYSTEMS INC.
    Inventors: Seung Young Park, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee, Myung Jin Kim
  • Publication number: 20220141040
    Abstract: A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.
    Type: Application
    Filed: January 22, 2021
    Publication date: May 5, 2022
    Inventors: Myung Woo CHUNG, Hyun Min CHOI, Sang Gyoo SIM, Eui Seok KIM, Duk Soo KIM, Seok Woo LEE
  • Publication number: 20220137876
    Abstract: A method of distributedly storing data in a system comprising a plurality of edge nodes communicatively coupled to an end device and a central cloud. The method includes: receiving, by a first edge node, data transmitted by the end device; assigning, by the first edge node, a data tag to received data according to attributes of the received data and duplicating the received data to generate a tagged data copy; and transmitting, by the first edge node, the tagged data copy to at least one second edge node determined by a data distribution policy determined by the central cloud directly or through the central cloud, so that the at least one second edge node store the tagged data copy in a storage.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 5, 2022
    Inventors: Myung Woo CHUNG, Chel PARK, Sang Gyoo SIM, Eui Seok KIM, Duk Soo KIM, Seok Woo LEE